Discover PerformanceHP Software's community for IT leaders // July 2013
Defense in 5 stages: Understanding the kill chain
If you’re putting all your efforts into keeping bad guys out, you’ve only covered stage one.Killer security
An X-ray of the SEA
HP Security Research assesses the Syrian Electronic Army and how to protect your enterprise against such adversaries.Cutting-edge foes
Rate your IT against the best
The HP leader who surveyed 650 companies tells us what CIOs can learn from the best in the field.Stand tall
Threat to your share price
Jay Huff and other HP security execs discuss the impact to brand and the reputational damage of a breach—especially with the legal obligation to declare any breach.Watch now
Most read articles
Preparing today for tomorrow’s threats.
Introduction to Enterprise 20/20
What will a successful enterprise look like in the future?
Challenges and opportunities for the CIO of the future.
Dev Center 20/20
How will we organize development centers for the apps that will power our enterprises?
Welcome to a new reality of split-second decisions and marketing by the numbers.
IT Operations 20/20
How can you achieve the data center of the future?
What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.
Looking toward the era when everyone — and everything — is connected.
Data Center 20/20
The innovation and revenue engine of the enterprise.
Connect with nearly 1,500 security pros to learn how to better disrupt or mitigate threats. Learn to think like a bad guy. (Washington, D.C., Sept. 8 – 11)
The Heartbleed vulnerability set users and enterprises scrambling. How can we avoid or mitigate the next Heartbleed?
HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episode.
The percentage of IT organizations that expect all critical apps and operations will be sourced via the cloud by 2016. (Three percent say that’s the case now. An additional 27% expect to get there by 2020.)1
Year by which public cloud infrastructure will be required by the United States to comply with critical national infrastructure regulations. 2
Percentage of overall IT security enterprise product capabilities that will be delivered in the cloud by 2015.2
2“Predicts 2013: Security Solutions,” Gartner Inc., January 2013
Q: How do we prepare for an all-but-inevitable security breach?
A: The smart CISO starts with assessing the state of the business. … “What are we protecting?” The key is to get your business leaders, the people who run and understand the business itself, to answer that question. ... Coca-Cola has the secret formula … Everyone has something they need to protect. Keep in mind that you have to limit the answer to critical things. There is absolutely no feasible way to defend everything in the organization.
—Rafal Los, Principal, HP Enterprise Security Services, on his Wh1t3 Rabbit blog